NetWork | ZeroBOX

Network Analysis

IP Address Status Action
104.20.67.143 Active Moloch
164.124.101.2 Active Moloch
194.169.175.127 Active Moloch
5.42.65.80 Active Moloch
51.15.193.130 Active Moloch
51.15.58.224 Active Moloch
79.137.192.18 Active Moloch
95.214.27.254 Active Moloch
POST 200 http://5.42.65.80/8bmeVwqx/index.php
REQUEST
RESPONSE
GET 200 http://galandskiyher5.com/downloads/toolspub2.exe
REQUEST
RESPONSE
POST 200 http://5.42.65.80/8bmeVwqx/index.php
REQUEST
RESPONSE
GET 404 http://95.214.27.254/getfile/taskhost.exe
REQUEST
RESPONSE
POST 200 http://5.42.65.80/8bmeVwqx/index.php
REQUEST
RESPONSE
GET 404 http://95.214.27.254/getfile/winlog.exe
REQUEST
RESPONSE
POST 200 http://5.42.65.80/8bmeVwqx/index.php
REQUEST
RESPONSE
GET 404 http://95.214.27.254/getfile/msedge.exe
REQUEST
RESPONSE
POST 200 http://5.42.65.80/8bmeVwqx/index.php
REQUEST
RESPONSE
GET 200 http://79.137.192.18/latestX.exe
REQUEST
RESPONSE
POST 200 http://5.42.65.80/8bmeVwqx/index.php
REQUEST
RESPONSE
POST 200 http://5.42.65.80/8bmeVwqx/index.php
REQUEST
RESPONSE
POST 200 http://5.42.65.80/8bmeVwqx/index.php
REQUEST
RESPONSE
POST 200 http://5.42.65.80/8bmeVwqx/index.php
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49179 -> 5.42.65.80:80 2044623 ET MALWARE Amadey Bot Activity (POST) A Network Trojan was detected
TCP 192.168.56.101:49179 -> 5.42.65.80:80 2044623 ET MALWARE Amadey Bot Activity (POST) A Network Trojan was detected
TCP 192.168.56.101:49179 -> 5.42.65.80:80 2044623 ET MALWARE Amadey Bot Activity (POST) A Network Trojan was detected
TCP 192.168.56.101:49171 -> 5.42.65.80:80 2027700 ET MALWARE Amadey CnC Check-In Malware Command and Control Activity Detected
TCP 192.168.56.101:49171 -> 5.42.65.80:80 2044695 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M1 A Network Trojan was detected
TCP 192.168.56.101:49171 -> 5.42.65.80:80 2045751 ET MALWARE Win32/Amadey Bot Activity (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49171 -> 5.42.65.80:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49180 -> 95.214.27.254:80 2017679 ET HUNTING SUSPICIOUS winlog.exe in URI Probable Process Dump/Trojan Download A Network Trojan was detected
TCP 192.168.56.101:49180 -> 95.214.27.254:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49180 -> 95.214.27.254:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 194.169.175.127:80 -> 192.168.56.101:49174 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 194.169.175.127:80 -> 192.168.56.101:49174 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 192.168.56.101:49178 -> 95.214.27.254:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 192.168.56.101:49181 -> 79.137.192.18:80 2017598 ET MALWARE Possible Kelihos.F EXE Download Common Structure A Network Trojan was detected
TCP 192.168.56.101:49181 -> 79.137.192.18:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 79.137.192.18:80 -> 192.168.56.101:49181 2014819 ET INFO Packed Executable Download Misc activity
TCP 79.137.192.18:80 -> 192.168.56.101:49181 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 79.137.192.18:80 -> 192.168.56.101:49181 2016538 ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download Potentially Bad Traffic
TCP 79.137.192.18:80 -> 192.168.56.101:49181 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
UDP 192.168.56.101:54148 -> 164.124.101.2:53 2033268 ET POLICY Observed DNS Query to Coin Mining Domain (nanopool .org) Potential Corporate Privacy Violation
TCP 192.168.56.101:49179 -> 5.42.65.80:80 2044696 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 A Network Trojan was detected
TCP 192.168.56.101:49179 -> 5.42.65.80:80 2044623 ET MALWARE Amadey Bot Activity (POST) A Network Trojan was detected
TCP 192.168.56.101:49179 -> 5.42.65.80:80 2044623 ET MALWARE Amadey Bot Activity (POST) A Network Trojan was detected
TCP 192.168.56.101:49179 -> 5.42.65.80:80 2044623 ET MALWARE Amadey Bot Activity (POST) A Network Trojan was detected
TCP 192.168.56.101:49186 -> 104.20.67.143:443 906200068 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (CoinMiner) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.3
192.168.56.101:49185
51.15.58.224:14433
None None None
TLS 1.3
192.168.56.101:49186
104.20.67.143:443
None None None
TLS 1.3
192.168.56.101:49187
51.15.193.130:14433
None None None

Snort Alerts

No Snort Alerts